• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis
 

Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis

on

  • 888 views

 

Statistics

Views

Total Views
888
Views on SlideShare
886
Embed Views
2

Actions

Likes
0
Downloads
1
Comments
0

2 Embeds 2

https://twitter.com 1
http://www.steampdf.com 1

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

CC Attribution-ShareAlike LicenseCC Attribution-ShareAlike License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis Hackers and Hollywood 2: Considering Televisual Cyberthreats In Security Risk Analysis Presentation Transcript

    • Hackers and Hollywood 2:Considering Televisual Cyber threats In Security Risk A nalysis
    • THE FOLLOWING PREVIEW HAS BEEN APPROVED FOR THE FOLLOWING HAS BEEN APPROVED FOR APPROPRIATE AUDIENCES BY THE MOTION PICTURE ASSOCIATION OF AMERICA, INC. BY THE MOTION PICTURE ASSOCIATION OF AMERICA, INC.www.filmratings.com www.filmratings.com www.mpaa.com www.mpaa.com
    • Coming Soon
    • to acomputer near you
    • The Dublin Institute ofTechnology proudly presents…
    • aDamianGordon production
    • Hacker s and HollywoodConsidering Televisual Cyber threats In Security Risk A nalysis
    • Hacker s and HollywoodConsidering Televisual Cyber threats In Security Risk A nalysis
    • But first, a story
    • Years and years ago…
    • Years and years ago… UNNAMED ORGANISATION
    • Years and years ago… OwnerMy boss’s boss My boss me
    • Years and years ago… OwnerMy boss’s boss My boss me
    • Years and years ago… OwnerMy boss’s boss My boss me
    • First task…Create security policies for 14 companies
    • = bewilderment
    • Security Policy Risk Analysis Security Policy
    • How do you identify threats?“…experience and imagination…” - Pfleeger and Pfleeger
    • How do you identify threats?“…experience and imagination…” - Pfleeger and Pfleeger
    • Hackers on Television
    • The work• This research set out to identify whether or not television is accurately portraying hackers, and the implications of that portrayal for new and non-technical managers.
    • “I’ll create a GUI interface using VisualBasic…see if I can track an IP address.”
    • Hacker vs Hacker
    • Data Collection
    • Hermeneutic Phenomenology
    • Six Principles
    • IThe show must featurea hacker in it, and the hacker must be well- developed character
    • IIOnce a hacker characterhas been shown to hack a few times, they don’t have to hack in each episode to be still considered a hacker.
    • IIINo animated television shows will be considered.
    • IV If a show introduces a hacker group, all the members are counted, even if only some ofthem are shown hacking.
    • VWhen a hacker appearson a different TV show, they don’t need to beshown to be hacking in the new show for it to count.
    • VI No hackerdocumentaries will be considered, only television shows.
    • Resulting in…
    • 80 Television Shows• The Avengers • Stingray (NBC) • Walker, Texas Ranger • Heroes• Doctor Who • MacGyver • Level 9 • Eureka (A Town Called Eureka)• Star Trek • Max Headroom • Dark Angel • Halfway Home• The Man from U.N.C.L.E • Inspector Morse • The Outer Limits • The Kill Point• The Prisoner • The Powers That Be • The Lone Gunmen • The Bionic Woman• Dragnet 1969 • Ghostwriter • Alias • Chuck• The Sweeney • SeaQuest DSV • Smallville • Terminator• Wonder Woman • Weird Science • Spooks • Knight Rider• Blakes 7 • The X-Files • Birds of Prey • Lewis• Simon & Simon • VR.5 • Jake 2.0 • Moonlight• • The Greatest American Hero Nowhere Man • 24 • Numb3rs• Whiz Kids • Profiler • Battlestar Galactica • Leverage• Automan • Team Knight Rider • JAG • Sons of Anarchy• Knight Rider • La Femme Nikita • NCIS • Warehouse 13• Riptide • Buffy the Vampire Slayer• Veronica Mars • NCIS: Los Angeles• Airwolf • Millennium • Hustle • The Mentalist• Blue Thunder • Diagnosis Murder • CSI: NY • Going Postal• The Paper Chase • The Net • Criminal Minds • Strike Back• V: The Series • First Wave • Torchwood • Nikita• Max Headroom: UK Pilot • Total Recall 2070 • Global Frequency • Criminal Minds: Suspect Behavior
    • When was the first hacker on TV? 1950s 1960s 1970s 1980s 1990s 2000s
    • Would you believe?1950s1960s1970s1980s1990s2000s
    • I thought it was...1950s1960s1970s1980s1990s2000s
    • The Sweeney• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)
    • 1960s
    • The Avengers• Year: 1962• Episode: The Big Thinker• Character: Dr. Farrow
    • Doctor Who• Years: 1963-Present• Episode: All 784 Episodes• Character: The Doctor
    • Star Trek• Years: 1966-1969• Episodes: All 79 Episodes• Character: James T. Kirk
    • The Man from U.N.C.L.E• Years: 1966• Episode: The Off-Broadway Affair• Character: David X. Machina
    • The Prisoner• Years: 1967• Episode: The General• Character: Number 6 (aka John Drake?)
    • Dragnet 1969• Years: 1969• Episode: Frauds• Characters: Paul William Nichols and Peggy Sue Thompson
    • 1970s
    • The Sweeney• Years: 1976• Episode: Tomorrow Man• Characters: Tony Grey (John Hurt)
    • Wonder Woman• Years: 1978• Episode: IRAC is Missing• Characters: Bernard Havitol (Ross Martin)
    • Blake’s 7• Years: 1978-81• Episode: All Episodes (-1)• Characters: Kerr Avon
    • 1980s
    • Whiz Kids• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler, Hamilton Parker and Jeremy Saldino
    • Whiz Kids• Years: 1983-1984• Episode: All Episodes• Characters: Richie Adler, Alice Tyler, Hamilton Parker and Jeremy Saldino
    • 1990s
    • The X-Files
    • The X-Files
    • The X-Files
    • The X-Files
    • The X-Files “CYBERSPACE”
    • Diagnosis: Murder• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd Harcourt, Tapley and J.W.
    • Diagnosis: Murder• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd Harcourt, Tapley and J.W.
    • Diagnosis: Murder• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd Harcourt, Tapley and J.W.
    • Diagnosis: Murder• Years: 1998• Episode: Rear Windows ‘98• Characters: Charles Colter, Boyd Harcourt, Tapley and J.W.
    • 2000s
    • Remakes
    • Based on comics
    • Sequels
    • Comparing thetelevision to real life
    • In real life… Average age of a hacker? 0-25 years old25-50 years old50-75 years old
    • In real life… Average age of a hacker! 0-25 years old25-50 years old50-75 years old
    • On television…Age of Hackers
    • In real life… Occupations of hackers• Mostly IT industry, with a few full-time hackers.
    • On television…Occupation of hackers
    • In real life… Insider versus outsider attacks• Might be 50/50,• might be anything 
    • On television…
    • Hacking on TelevisionHACKING FEATURED• Salami Slicing Attack• Social Engineering• Hacking Software• Insider Attacks• Password Software
    • Hacking on TelevisionHACKING FEATURED HACKING NOT FEATURED• Salami Slicing Attack • DoS Attacks• Social Engineering • Phishing• Hacking Software • Organisation ID Theft• Insider Attacks • eHarassment of employees• Password Software
    • But…• “teenagers sitting in their bedrooms ”• “often high school or university students ”
    • Conclusion OK so what does that tell us• Is it us or them?• We need to make it clearer
    • ???Questions ???